Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 1 | // Copyright 2018 The Chromium OS Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "cros-disks/sshfs_helper.h" |
| 6 | |
| 7 | #include <string> |
| 8 | #include <vector> |
| 9 | |
| 10 | #include <base/strings/string_split.h> |
| 11 | #include <base/strings/string_util.h> |
| 12 | #include <base/strings/stringprintf.h> |
Sergei Datsenko | a910bba | 2019-06-18 13:31:59 +1000 | [diff] [blame^] | 13 | #include <brillo/process_reaper.h> |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 14 | #include <gmock/gmock.h> |
| 15 | #include <gtest/gtest.h> |
| 16 | |
| 17 | #include "cros-disks/fuse_mounter.h" |
| 18 | #include "cros-disks/mount_options.h" |
| 19 | #include "cros-disks/platform.h" |
| 20 | #include "cros-disks/uri.h" |
| 21 | |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 22 | using testing::DoAll; |
| 23 | using testing::Eq; |
| 24 | using testing::HasSubstr; |
| 25 | using testing::Not; |
| 26 | using testing::Return; |
| 27 | using testing::SetArgPointee; |
| 28 | using testing::StrEq; |
| 29 | using testing::_; |
| 30 | |
| 31 | namespace cros_disks { |
| 32 | |
| 33 | namespace { |
| 34 | |
| 35 | const uid_t kMountUID = 200; |
| 36 | const gid_t kMountGID = 201; |
| 37 | const uid_t kFilesUID = 700; |
| 38 | const uid_t kFilesGID = 701; |
| 39 | const uid_t kFilesAccessGID = 1501; |
| 40 | const base::FilePath kWorkingDir("/wkdir"); |
| 41 | const base::FilePath kMountDir("/mnt"); |
| 42 | const Uri kSomeSource("sshfs", "src"); |
| 43 | |
| 44 | // Mock Platform implementation for testing. |
| 45 | class MockPlatform : public Platform { |
| 46 | public: |
| 47 | MockPlatform() = default; |
| 48 | |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 49 | bool GetUserAndGroupId(const std::string& user, |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 50 | uid_t* user_id, |
| 51 | gid_t* group_id) const override { |
| 52 | if (user == "fuse-sshfs") { |
| 53 | if (user_id) |
| 54 | *user_id = kMountUID; |
| 55 | if (group_id) |
| 56 | *group_id = kMountGID; |
| 57 | return true; |
| 58 | } |
| 59 | if (user == FUSEHelper::kFilesUser) { |
| 60 | if (user_id) |
| 61 | *user_id = kFilesUID; |
| 62 | if (group_id) |
| 63 | *group_id = kFilesGID; |
| 64 | return true; |
| 65 | } |
| 66 | return false; |
| 67 | } |
| 68 | |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 69 | bool GetGroupId(const std::string& group, gid_t* group_id) const override { |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 70 | if (group == FUSEHelper::kFilesGroup) { |
| 71 | if (group_id) |
| 72 | *group_id = kFilesAccessGID; |
| 73 | return true; |
| 74 | } |
| 75 | return false; |
| 76 | } |
| 77 | |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 78 | MOCK_CONST_METHOD3(SetOwnership, |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 79 | bool(const std::string& path, |
| 80 | uid_t user_id, |
| 81 | gid_t group_id)); |
| 82 | MOCK_CONST_METHOD2(SetPermissions, |
| 83 | bool(const std::string& path, mode_t mode)); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 84 | MOCK_CONST_METHOD3(WriteFile, |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 85 | int(const std::string& path, const char* data, int size)); |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 86 | }; |
| 87 | |
| 88 | } // namespace |
| 89 | |
| 90 | class SshfsHelperTest : public ::testing::Test { |
| 91 | public: |
Sergei Datsenko | a910bba | 2019-06-18 13:31:59 +1000 | [diff] [blame^] | 92 | SshfsHelperTest() : helper_(&platform_, &process_reaper_) { |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 93 | ON_CALL(platform_, SetOwnership(_, kMountUID, getgid())) |
| 94 | .WillByDefault(Return(true)); |
| 95 | ON_CALL(platform_, SetPermissions(_, 0770)).WillByDefault(Return(true)); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 96 | ON_CALL(platform_, WriteFile(_, _, _)).WillByDefault(Return(-1)); |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 97 | } |
| 98 | |
| 99 | protected: |
| 100 | MockPlatform platform_; |
Sergei Datsenko | a910bba | 2019-06-18 13:31:59 +1000 | [diff] [blame^] | 101 | brillo::ProcessReaper process_reaper_; |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 102 | SshfsHelper helper_; |
| 103 | }; |
| 104 | |
| 105 | // Verifies that CreateMounter creates mounter in a simple case. |
| 106 | TEST_F(SshfsHelperTest, CreateMounter_SimpleOptions) { |
| 107 | auto mounter = helper_.CreateMounter(kWorkingDir, kSomeSource, kMountDir, {}); |
| 108 | EXPECT_EQ("sshfs", mounter->filesystem_type()); |
Sergei Datsenko | 3cf72cb | 2019-04-01 11:27:50 +1100 | [diff] [blame] | 109 | EXPECT_EQ("src", mounter->source()); |
| 110 | EXPECT_EQ("/mnt", mounter->target_path().value()); |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 111 | std::string opts = mounter->mount_options().ToString(); |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 112 | EXPECT_THAT(opts, HasSubstr("BatchMode=yes")); |
| 113 | EXPECT_THAT(opts, HasSubstr("PasswordAuthentication=no")); |
| 114 | EXPECT_THAT(opts, HasSubstr("KbdInteractiveAuthentication=no")); |
Joel Hockey | 1a00fef | 2018-07-26 20:25:39 -0700 | [diff] [blame] | 115 | EXPECT_THAT(opts, HasSubstr("follow_symlinks")); |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 116 | EXPECT_THAT(opts, HasSubstr("uid=700")); |
| 117 | EXPECT_THAT(opts, HasSubstr("gid=1501")); |
| 118 | } |
| 119 | |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 120 | // Verifies that CreateMounter writes files to the working dir when provided. |
| 121 | TEST_F(SshfsHelperTest, CreateMounter_WriteFiles) { |
| 122 | EXPECT_CALL(platform_, WriteFile("/wkdir/id", StrEq("some key"), 8)) |
| 123 | .WillOnce(Return(8)); |
| 124 | EXPECT_CALL(platform_, WriteFile("/wkdir/known_hosts", StrEq("some host"), 9)) |
| 125 | .WillOnce(Return(9)); |
| 126 | EXPECT_CALL(platform_, SetPermissions("/wkdir/id", 0600)) |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 127 | .WillOnce(Return(true)); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 128 | EXPECT_CALL(platform_, SetPermissions("/wkdir/known_hosts", 0600)) |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 129 | .WillOnce(Return(true)); |
| 130 | EXPECT_CALL(platform_, SetPermissions("/wkdir", 0770)).WillOnce(Return(true)); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 131 | EXPECT_CALL(platform_, SetOwnership("/wkdir/id", kMountUID, kMountGID)) |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 132 | .WillOnce(Return(true)); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 133 | EXPECT_CALL(platform_, |
| 134 | SetOwnership("/wkdir/known_hosts", kMountUID, kMountGID)) |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 135 | .WillOnce(Return(true)); |
| 136 | EXPECT_CALL(platform_, SetOwnership("/wkdir", kMountUID, getgid())) |
| 137 | .WillOnce(Return(true)); |
| 138 | auto mounter = helper_.CreateMounter( |
| 139 | kWorkingDir, kSomeSource, kMountDir, |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 140 | {"IdentityBase64=c29tZSBrZXk=", "UserKnownHostsBase64=c29tZSBob3N0", |
| 141 | "IdentityFile=/foo/bar", "UserKnownHostsFile=/foo/baz", |
Sergei Datsenko | 1aa5536 | 2018-05-14 15:19:27 +1000 | [diff] [blame] | 142 | "HostName=localhost", "Port=2222"}); |
Ben Chan | 213c6d9 | 2019-04-10 16:21:52 -0700 | [diff] [blame] | 143 | std::string opts = mounter->mount_options().ToString(); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 144 | EXPECT_THAT(opts, HasSubstr("IdentityFile=/wkdir/id")); |
| 145 | EXPECT_THAT(opts, HasSubstr("UserKnownHostsFile=/wkdir/known_hosts")); |
Sergei Datsenko | 1aa5536 | 2018-05-14 15:19:27 +1000 | [diff] [blame] | 146 | EXPECT_THAT(opts, HasSubstr("HostName=localhost")); |
| 147 | EXPECT_THAT(opts, HasSubstr("Port=2222")); |
Sergei Datsenko | ad2cb6a | 2018-05-15 17:34:26 +1000 | [diff] [blame] | 148 | EXPECT_THAT(opts, Not(HasSubstr("Base64"))); |
| 149 | EXPECT_THAT(opts, Not(HasSubstr("c29tZSB"))); |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 150 | EXPECT_THAT(opts, Not(HasSubstr("/foo/bar"))); |
| 151 | EXPECT_THAT(opts, Not(HasSubstr("/foo/baz"))); |
| 152 | } |
| 153 | |
Sergei Datsenko | bcd8e46 | 2018-04-20 15:44:56 +1000 | [diff] [blame] | 154 | // Verifies that CanMount correctly identifies handleable URIs. |
| 155 | TEST_F(SshfsHelperTest, CanMount) { |
| 156 | EXPECT_TRUE(helper_.CanMount(Uri::Parse("sshfs://foo"))); |
| 157 | EXPECT_FALSE(helper_.CanMount(Uri::Parse("sshfss://foo"))); |
| 158 | EXPECT_FALSE(helper_.CanMount(Uri::Parse("ssh://foo"))); |
| 159 | EXPECT_FALSE(helper_.CanMount(Uri::Parse("sshfs://"))); |
| 160 | } |
| 161 | |
| 162 | // Verifies that GetTargetSuffix escapes unwanted chars in URI. |
| 163 | TEST_F(SshfsHelperTest, GetTargetSuffix) { |
| 164 | EXPECT_EQ("foo", helper_.GetTargetSuffix(Uri::Parse("sshfs://foo"))); |
| 165 | EXPECT_EQ("usr@host_com:", |
| 166 | helper_.GetTargetSuffix(Uri::Parse("sshfs://usr@host.com:"))); |
| 167 | EXPECT_EQ("host:$some$path$__", |
| 168 | helper_.GetTargetSuffix(Uri::Parse("sshfs://host:/some/path/.."))); |
| 169 | } |
| 170 | |
| 171 | } // namespace cros_disks |